AND-401Building Security In Maturity Model-BSIMM

合集下载

ERP词汇中英文对照V1.0

ERP词汇中英文对照V1.0

NO Abbr aa1ABM Activity-based Management2AO Application Outsourcing3APICS American Production and Inventory4APICS Applied Manufacturing Education S5APO Advanced Planning and Optimizatio6APS Advanced Planning and Scheduling7ASP Application Service/Software Prov8ATO Assemble To Order9ATP Available To Promise10B2B Business to Business11B2C Business to Consumer12B2G Business to Government13B2R Business to Retailer14BIS Business Intelligence System15BOM Bill Of Materials16BOR Bill Of Resource17BPR Business Process Reengineering18BPM Business Process Management19BPS Business Process Standard20C/S Client/Server(C/S)\Browser/Server21CAD Computer-Aided Design22CAID Computer-Aided Industrial Design23CAM Computer-Aided Manufacturing24CAPP Computer-Aided Process Planning25CASE Computer-Aided Software Engineeri26CC Collaborative Commerce27CIMS Computer Integrated Manufacturing28CMM Capability Maturity Model29COMMS Customer Oriented Manufacturing M30CORBA Common Object Request Broker Arch31CPC Collaborative Product Commerce32CPIM Certified Production and Inventor33CPM Critical Path Method34CRM Customer Relationship Management35CRP capacity requirements planning36CTI Computer Telephony Integration37CTP Capable to Promise38DCOM Distributed Component Object Mode39DCS Distributed Control System40DMRP Distributed MRP41DRP Distribution Resource Planning42DSS Decision Support System43DTF Demand Time Fence44DTP Delivery to Promise45EAI Enterprise Application Integratio46EAM Enterprise Assets Management47ECM Enterprise Commerce Management48ECO Engineering Change Order49EDI Electronic Data Interchange50EDP Electronic Data Processing51EEA Extended Enterprise Applications 52EIP Enterprise Information Portal53EIS Executive Information System54EOI Economic Order Interval55EOQ Economic Order Quantity56EPA Enterprise Proficiency Analysis 57ERP Enterprise Resource Planning58ERM Enterprise Resource Management59ETO Engineer To Order60FAS Final Assembly Schedule61FCS Finite Capacity Scheduling62FMS Flexible Manufacturing System63FOQ Fixed Order Quantity64GL General Ledger65GUI Graphical User Interface66HRM Human Resource Management67HRP Human Resource Planning68IE Industry Engineering/Internet Exp 69ISO International Standard Organizati 70ISP Internet Service Provider71ISPE International Society for Product 72IT/GT Information/Group Technology73JIT Just In Time74KPA Key Process Areas75KPI Key Performance Indicators76LP Lean Production77MES Manufacturing Executive System78MIS Management Information System79MPS Master Production Schedule80MRP Material Requirements Planning81MRPII Manufacturing Resource Planning 82MTO Make To Order83MTS Make To Stock84OA Office Automation85OEM Original Equipment Manufacturing 86OPT Optimized Production Technology 87OPT Optimized Production Timetable88PADIS Production And Decision Informati 89PDM Product Data Management90PERT Program Evaluation Research Techn 91PLM Production Lifecycle Management 92PM Project Management93POQ Period Order Quantity94PRM Partner Relationship Management95PTF Planned Time Fence96PTX Private Trade Exchange97RCCP Rough-Cut Capacity Planning98RDBM Relational Data Base Management99RPM Rapid Prototype Manufacturing100RRP Resource Requirements Planning101SCM Supply Chain Management102SCP Supply Chain Partnership103SFA Sales Force Automation104SMED Single-Minute Exchange Of Dies105SOP Sales And Operation Planning106SQL Structure Query Language107TCO Total Cost Ownership108TEI Total Enterprise Integration109TOC Theory Of Constraints/Constraints110TPM Total Productive Maintenance111TQC Total Quality Control112TQM Total Quality Management113WBS Work Breakdown System114XML eXtensible Markup Language115ABC Classification(Activity Based Classification) 116ABC costing117ABC inventory control118abnormal demand119acquisition cost ,ordering cost120action message121action report flag122activity cost pool123activity-based costing(ABC)124actual capacity125adjust on hand126advanced manufacturing technology127advanced pricing128AM Agile Manufacturing129alternative routing130Anticipated Delay Report131anticipation inventory132apportionment code133assembly parts list134automated storage/retrieval syste135Automatic Rescheduling136available inventory137available material138available stock139available work140average inventory141back order142back scheduling143base currency144batch number145batch process146batch production147benchmarking148bill of labor149bill of lading150branch warehouse151bucketless system152business framework153business plan154capacity level155capacity load156capacity management157carrying cost158carrying cost rate159cellular manufacturing160change route161change structure162check point163closed loop MRP164Common Route Code(ID)165component-based development 166concurrent engineering167conference room pilot168configuration code169continuous improvement170continuous process171cost driver172cost driver rate173cost of stockout174cost roll-up175crew size176critical part177critical ratio178critical work center179CLT Cumulative Lead Time180current run hour181current run quantity182customer care183customer deliver lead time 184customer loyalty185customer order number186customer satisfaction187customer status188cycle counting189DM Data Mining190Data Warehouse191days offset192dead load193demand cycle194demand forecasting195demand management196Deming circle197demonstrated capacity198discrete manufacturing199dispatch to200DRP Distribution Requirements Plannin 201drop shipment202dunning letter203ECO workbench204employee enrolled205employee tax id206end item207engineering change mode flag208engineering change notice209equipment distribution210equipment management211exception control212excess material analysis213expedite code214external integration215fabrication order216factory order217fast path method218fill backorder219final assembly lead time220final goods221finite forward scheduling222finite loading223firm planned order224firm planned time fence225FPR Fixed Period Requirements226fixed quantity227fixed time228floor stock229flow shop230focus forecasting231forward scheduling232freeze code233freeze space234frozen order235gross requirements236hedge inventory237in process inventory238in stock239incrementing240indirect cost241indirect labor242infinite loading243input/output control244inspection ID245integrity246inter companies247interplant demands248inventory carry rate249inventory cycle time250inventory issue251inventory location type 252inventory scrap253inventory transfers254inventory turns/turnover 255invoice address256invoice amount gross257invoice schedule258issue cycle259issue order260issue parts261issue policy262item availability263item description264item number265item record266item remark267item status268job shop269job step270kit item271labor hour272late days273lead time274lead time level275lead time offset days276least slack per operation 277line item278live pilot279load leveling280load report281location code282location remarks283location status284lot for lot285lot ID286lot number287lot number traceability288lot size289lot size inventory290lot sizing291low level code292machine capacity293machine hours294machine loading295maintenance ,repair,and operating 296make or buy decision297management by exception298manufacturing cycle time299manufacturing lead time300manufacturing standards301master scheduler302material303material available304material cost305material issues and receipts306material management307material manager308material master,item master309material review board310measure of velocity311memory-based processing speed312minimum balance313Modern Materials Handling314month to date315move time , transit time316MSP book flag317multi-currency318multi-facility319multi-level320multi-plant management321multiple location322net change323net change MRP324net requirements325new location326new parent327new warehouse328next code329next number330No action report331non-nettable332on demand333on-hand balance334on hold335on time336open amount337open order338order activity rules339order address340order entry341order point342order point system343order policy344order promising345order remarks346ordered by347overflow location348overhead apportionment/allocation 349overhead rate,burden factor,absor 350owner's equity351parent item352part bills353part lot354part number355people involvement356performance measurement357physical inventory358picking359planned capacity360planned order361planned order receipts362planned order releases363planning horizon364point of use365Policy and procedure366price adjustments367price invoice368price level369price purchase order370priority planning371processing manufacturing372product control373product family374product mix375production activity control376production cycle377production line378production rate379production tree380PAB Projected Available Balance 381purchase order tracking382quantity allocation383quantity at location384quantity backorder385quantity completion386quantity demand387quantity gross388quantity in389quantity on hand390quantity scrapped391quantity shipped392queue time393rated capacity394receipt document395reference number396regenerated MRP397released order398reorder point399repetitive manufacturing 400replacement parts401required capacity402requisition orders403rescheduling assumption404resupply order405rework bill406roll up407rough cut resource planning 408rounding amount409run time410safety lead time411safety stock412safety time413sales order414scheduled receipts415seasonal stock416send part417service and support418service parts419set up time420ship address421ship contact422ship order423shop calendar424shop floor control425shop order , work order426shrink factor427single level where used428standard cost system429standard hours430standard product cost431standard set up hour432standard unit run hour433standard wage rate434status code435stores control436suggested work order437supply chain438synchronous manufacturing439time bucket440time fence441time zone442top management commitment443total lead time444transportation inventory445unfavorable variance, adverse446unit cost447unit of measure448value chain449value-added chain450variance in quantity451vendor scheduler,supplier schedul 452vendor scheduling453Virtual Enterprise(VE)/ Organizat 454volume variance455wait time456where-used list457work center capacity458workflow459work order460work order tracking461work scheduling462world class manufacturing excelle 463zero inventories464465Call/Contact/Work/Cost center 466Co/By-product467E-Commerce/E-Business/E-Marketing 468E-sales/E-procuement/E-partner 469independent/dependent demand470informal/formal system471Internet/Intranet/Extranet472middle/hard/soft/share/firm/group ware 473pegging/kitting/netting/nettable474picking/dispatch/disbursement lis475preflush/backflush/super backflus476yield/scrap/shrinkage (rate)477scrap/shrinkage factor478479costed BOM480engineering BOM481indented BOM482manufacturing BOM483modular BOM484planning BOM485single level BOM486summarized BOM487488account balance489account code490account ledger491account period492accounts payable493accounts receivable494actual cost495aging496balance due497balance in hand498balance sheet499beginning balance500cash basis501cash on bank502cash on hand503cash out to504catalog505category code506check out507collection508cost simulation509costing510current assets511current liabilities512current standard cost513detail514draft remittance515end of year516ending availables517ending balance518exchange rate519expense520financial accounting521financial entity522financial reports523financial statements524fiscal period525fiscal year526fixed assets527foreign amount528gains and loss529in balance530income statement531intangible assets532journal entry533management accounting534manual reconciliation535notes payable536notes receivable537other receivables538pay aging539pay check540pay in541pay item542pay point543pay status544payment instrument545payment reminder546payment status547payment terms548period549post550proposed cost551simulated cost552spending variance,expenditure var 553subsidiary554summary555tax code556tax rate557value added tax558559as of date , stop date560change lot date561clear date562date adjust563date available564date changed565date closed566date due567date in produced568date inventory adjust569date obsolete570date received571date released572date required573date to pull574earliest due date575effective date576engineering change effect date 577engineering stop date578expired date579from date580last shipment date581need date582new date583pay through date584receipt date585ship date586587allocation588alphanumeric589approver590assembly591backlog592billing593bill-to594bottleneck595bulk596buyer597component598customer599delivery600demand601description602discrete603ergonomics604facility605feature606forecast607freight608holidays609implement610ingredient611inquire612inventory613item614job615Kanban616level617load618locate619logistics620lot621option622outstanding623overhead624override625overtime626parent627part628phantom629plant630preference631priority632procurement633prototyping634queue635quota636receipt637regeneration638remittance639requisition640returned641roll642routing643schedule644shipment645ship-to646shortage647shrink648spread649statement650subassembly651supplier652transaction653what-if654655post-deduct inventory transaction 656pre-deduct inventory transaction 657generally accepted manufacturing658direct-deduct inventory transacti 659Pareto Principle660Drum-buffer-rope661663Open Database Connectivity664Production Planning665Work in Process666accelerated cost recovery system 667accounting information system668acceptable quality kevel669constant purchasing power account 670break-even analysis671book value672cost-benefit analysis673chief financial office674degree of financial leverage675degree of operating leverage676first-in , first-out677economic lot size678first-in ,still-here679full pegging680linear programming681management by objective682value engineering683zero based budgeting684CAQ computer aided quality assurance 685DBMS database management system686IP Internet Protocol687TCP T ransmission Control Protocol 689690API Advanced Process Industry691A2A Application to Application692article693article reserves694assembly order695balance-on-hand-inventory696bar code697boned warehouse698CPA Capacity Requirements Planning 699change management700chill space701combined transport702commodity inspection703competitive edge704container705container transport706CRP Continuous Replenishment Program707core competence708cross docking709CLV Customer Lifetime Value710CReM Customer Relationship Marketing 711CSS Customer Service and Support712Customer Service Representative 713customized logistics714customs declaration715cycle stock716data cleansing717Data Knowledge and Decision Suppo 718data level integration719data transformation720desktop conferencing721distribution722distribution and logistics723distribution center724distribution logistics725distribution processing726distribution requirements727DRP distribution resource planning 728door-to-door729drop and pull transport730DEM Dynamic Enterprise Module731ECR Efficient Consumer Response732e-Government Affairs733EC Electronic Commerce734Electronic Display Boards735EOS Electronic order system736ESD Electronic Software Distribution 737embedding738employee category739empowerment740engineering change effect work or 741environmental logistics742experiential marketing743export supervised warehouse744ERP Extended Resource Planning745field sales/cross sale/cross sell 746franchising747FCL Full Container Load748Global Logistics Management749goods collection750goods shed751goods shelf752goods stack753goods yard754handing/carrying755high performance organization756inland container depot757inside sales758inspection759intangible loss760internal logistics761international freight forwarding 762international logistics763invasive integration764joint distribution765just-in-time logistics766KM Knowledge Management767lead (customer) management768learning organization769LCL less than container load770load balancing771loading and unloading772logistics activity773logistics alliance774logistics center775logistics cost776logistics cost control777logistics documents778logistics enterprise779logistics information780logistics management781logistics modulus782logistics network783logistics operation784LRP Logistics Resource Planning785logistics strategy786logistics strategy management787logistics technology788MES Manufacture Execute System789mass customization790NPV Net Present Value791neutral packing792OLAP On-line Analysis Processing793OAG Open Application Group794order picking795outsourcing796package/packaging797packing of nominated brand798palletizing799PDA Personal Digital Assistant800personalization801PTF Planning time fence802POS Point Of Sells803priority queuing804PBX Private Branch Exchange805production logistics806publish/subscribe807quality of working life808Quick Response809receiving space810REPs Representatives811return logistics812ROI Return On Investment813RM Risk Management814sales package815scalability816shipping space817situational leadership818six sigma819sorting/stacking820stereoscopic warehouse821storage822stored procedure823storehouse824storing825SRM Supplier Relationship Management 826tangible loss827team building828TEM Technology-enabled Marketing829TES Technology-enabled Selling830TSR TeleSales Service Representative 831TPL Third-Part Logistics832through transport833unit loading and unloading834Value Management835value-added logistics service 836Value-chain integration837VMI Vender Managed Inventory838virtual logistics839virtual warehouse840vision841volume pricing model842warehouse843waste material logistics844workflow management845zero latency846ZLE Zero Latency Enterprise847ZLP Zero Latency Process848zero-inventory technologyCC S F NUM基于作业活动管理F10应用程序外包E21美国生产与库存管理协会ext L651实用制造管理系列培训教材ext C652先进计划及优化技术F14高级计划与排程技术F15应用服务/软件供应商L22定货组装L24可供销售量(可签约量)L31企业对企业(电子商务)F51企业对消费者(电子商务)F52企业对政府(电子商务)F53企业对经销商(电子商务)F54商业智能系统E47物料清单bom L471资源清单L43业务/企业流程重组E49业务/企业流程管理E49业务/企业流程标准E50客户机/服务器\浏览器/服务器abr L457计算机辅助设计L75计算机辅助工艺设计L76计算机辅助制造L77计算机辅助工艺设计L78计算机辅助软件工程L79协同商务E68计算机集成制造系统L73能力成熟度模型L55面向客户制造管理系统ext L653通用对象请求代理结构F70协同产品商务E69生产与库存管理认证资格ext F654关键线路法L92客户关系管理L102能力需求计划L60电脑电话集成(呼叫中心)L74可承诺的能力F56分布式组件对象模型F121分布式控制系统L122分布式MRP L123分销资源计划L125决策支持系统L110需求时界L115可承诺的交货时间F111企业应用集成E140企业资源管理E141企业商务管理F142工程变更订单D139电子数据交换L131电子数据处理F132扩展企业应用系统F152企业信息门户E143高层领导信息系统F150经济定货周期L129经济订货批量(经济批量法)L130企业绩效分析144企业资源计划L145企业资源管理L145专项设计,按订单设计L136最终装配计划L160有限能力计划L162柔性制造系统L171固定定货批量法L167总账cid D522图形用户界面F178人力资源管理L181人力资源计划L182工业工程/浏览器188国际标准化组织F194互联网服务提供商F195国际生产力促进会ext F655信息/成组技术abr F458准时制造/准时制生产L218关键过程域L220关键业绩指标F219精益生产L227制造执行系统L254管理信息系统L252主生产计划L259物料需求计划L268制造资源计划D256定货(订货)生产L249现货(备货)生产L250办公自动化L292原始设备制造商E311最优生产技术E300最优生产时刻表E301生产和决策管理信息系统L346产品数据管理L342计划评审技术L352产品生命周期管理E348项目管理353周期定量法L323合作伙伴关系管理F320计划时界L330自用交易网站F339粗能力计划L385关系数据库管理F372快速原形制造F367资源需求计划D380供应链管理L420供应链合作伙伴关系L421销售自动化L392快速换模法L408销售与运作规划L391结构化查询语言F417总体运营成本F428全面企业集成F429约束理论/约束管理L423全员生产力维护F431全面质量控制L432全面质量管理L433工作分解系统F448可扩展标记语言F153 ABC分类法T1作业成本法F2 ABC 库存控制D3反常需求D4定货费L5行为/活动(措施)信息D6活动报告标志D7作业成本集L8作业基准成本法/业务成本法L9实际能力D11调整现有库存量D12先进制造技术L13高级定价系统D16敏捷制造L17替代工序(工艺路线)D18拖期预报T19预期储备L20分摊码D23装配零件表D25自动仓储/检索系统C26计划自动重排T27可达到库存D28可用物料D29达到库存T30可利用工时T32平均库存D33欠交(脱期)订单L34倒排(序)计划/倒序排产?L35本位币D36批号D37批流程L38批量生产D39标杆瞄准(管理)sim F586工时清单D41提货单D42分库D44无时段系统L45业务框架D46经营规划L48能力利用水平L57能力负荷D58能力管理L59保管费L61保管费率D62单元式制造T63修改工序D64修改产品结构D65检查点sim D66闭环MRP L67通用工序标识T71组件(构件)开发技术F72并行(同步)工程L80会议室模拟L81配置代码D82进取不懈C84连续流程L85作业成本发生因素L86作业成本发生因素单位费用L87短缺损失L88成本滚动计算法L89班组规模D90急需零件D91紧迫系数L93关键工作中心L94累计提前期L95现有运转工时D96现有运转数量D97客户关怀D98客户交货提前期L99客户忠诚度F100客户订单号D101客户满意度F103客户状况D104周期盘点L105数据挖掘F106数据仓库F107偏置天数L108空负荷T109需求周期L112需求预测D113需求管理L114戴明环ext L116实际能力C117离散型生产L119调度D120分销需求计划L124直运C126催款信D127 ECO工作台D128在册员工D133员工税号D134最终产品D135工程变更方式标志D137工程变更通知D138设备分配D146设备管理D147例外控制D148呆滞物料分析D149急送代码T151外部集成F154加工订单T155工厂订单D156快速路径法D157补足欠交D158总装提前期D159成品D161有限顺排计划L163有限排负荷L164确认的计划订单L165确认计划需求时界L166定期用量法L168固定数量法D169固定时间法D170作业现场库存L172流水车间T173调焦预测T174顺排计划L175冻结码D176冷冻区D176冻结订单D177毛需求L179囤积库存L180在制品库存D183在库D184增值D185间接成本D186间接人工D187无限排负荷L189投入/产出控制L190检验标识D191完整性D192公司内部间D193厂际需求量T196库存周转率D197库存周期D197库存发放D198仓库库位类型D199库存报废量D200库存转移D201库存(资金)周转次数L202发票地址D203发票金额D204发票清单D205发放周期D206发送订单T207发放零件D208发放策略D209项目可供量D210项目说明D211项目编号D212项目记录T213项目备注D214项目状态D215加工车间L216作业步骤D217配套件项目D221人工工时D222延迟天数D223提前期L224提前期水平D225提前期偏置(补偿)天数D226最小单个工序平均时差C228单项产品T229应用模拟L230负荷量T231负荷报告T232仓位代码D233仓位备注T234仓位状况T235按需定货(因需定量法/缺补法)L236批量标识T237批量编号T238批号跟踪D239批量D240批量库存L241批量规划L242低层(位)码L243机器能力D244机时D245机器加载T246维护修理操作物料C247外购或自制决策D248例外管理法L251制造周期时间T253制造提前期D255制造标准D257主生产计划员L260物料L261物料可用量L262物料成本D263物料发放和接收D264物料管理L265物料经理L266物料主文件L267物料核定机构L269生产速率水平C270基于存储的处理速度F271最小库存余量L272现代物料搬运C273月累计D274传递时间L275 MPS登录标志T276多币制D277多场所D278多级D279多工厂管理F280多重仓位T281净改变法L282净改变式MRP T283净需求L284新仓位D285新组件D286新仓库D287后续编码D288后续编号D289不活动报告D290不可动用量C291急需的D293现有库存量D294挂起D295准时D296未清金额D298未结订单/开放订单L299订单活动规则D302订单地址D303订单输入T304定货点T305定货点法L306定货策略L307定货承诺T308定货备注T309定货者D310超量库位D312间接费分配L313间接费率L314所有者权益L315母件L316零件清单D317零件批次D318零件编号D319全员参治C321业绩评价L322实际库存D324领料/提货D325计划能力L326计划订单L327计划产出量L328计划投入量L329计划期/计划展望期L331使用点C332工作准则与工作规程L333价格调整D334发票价格D335物价水平D336采购订单价格D337优先计划D338流程制造D340产品控制D341产品系列D343产品搭配组合C344生产作业控制L345生产周期L347产品线D349产品率D350产品结构树T351预计可用库存(量)L354采购订单跟踪D355已分配量D356仓位数量T357欠交数量D358完成数量D359需求量D360毛需求量D361进货数量T362现有数量D363废品数量D364发货数量D365排队时间L366额定能力L368收款单据D369参考号D370重生成式MRP T371下达订单L373再订购点D374重复式生产(制造)L375替换零件D376需求能力L377请购单D378重排假设T379补库单L381返工单D382上滚D383粗资源计划D384舍入金额D386加工(运行)时间L387安全提前期L388安全库存L389保险期T390销售订单D393计划接收量(预计入库量/预期到货量)L394季节储备L395发送零件T396服务和支持D397维修件T398准备时间L399发运地址D400发运单联系人D401发货单D402工厂日历(车间日历)L403车间作业管理(控制)L404车间订单L405损耗因子(系数)D406单层物料反查表D407标准成本体系L409标准工时D410标准产品成本D411标准机器设置工时T412标准单位运转工时T413标准工资率T414状态代码D415库存控制T416建议工作单D418供应链L419同步制造/同期生产C422时段(时间段)L424时界L425时区L426领导承诺C427总提前期L430在途库存L434不利差异L435单位成本T436计量单位D437价值链L438增值链C439量差D440采购计划员/供方计划员L442采购计划法T443虚拟企业/公司L444产量差异L445等待时间L446反查用物料单L447工作中心能力L449工作流L450工作令T451工作令跟踪T452工作进度安排T453国际优秀制造业C454零库存T455456呼叫/联络/工作/成本中心abr X459联/副产品abr X460电子商务/电子商务/电子集市abr X461电子销售/电子采购/电子伙伴abr独立需求/相关需求件abr X462非/规范化管理系统abr X463互联网/企业内部网/企业外联网abr X464中间/硬/软/共享/固/群件abr X465追溯(反查)/配套出售件/净需求计算abr X466领料单(或提货单)/派工单/发料单abr X467预冲/倒冲法/完全反冲abr X468成品率/废品率/缩减率abr X469残料率(废品系数)/损耗系数abr fromchen470成本物料清单bom D472设计物料清单bom L473缩排式物料清单bom L474制造物料清单bom L475模块化物料清单bom L476计划物料清单bom L477单层物料清单bom D478汇总物料清单bom L479480账户余额cid D481账户代码cid D482分类账cid D483会计期间cid D484应付账款cid L485应收账款cid L486实际成本cid D487账龄cid D488到期余额cid D489现有余额cid D490资产负债表cid D491期初余额cid D492现金收付制cid D493银行存款cid L494现金cid L495支付给cid D496目录cid D497分类码cid D498结帐cid D499催款cid D500成本模拟cid D501成本核算cid D502流动资产cid L503流动负债cid L504现行标准成本cid C505明细cid D506汇票汇出cid D507年末cid D508期末可供量cid D509期末余额cid D510汇率cid D511费用cid D512财务会计cid L513财务实体cid L514财务报告cid D515财务报表cid D516财务期间cid D517财政年度cid D518固定资产cid L519外币金额cid D520损益cid D521平衡cid D523损益表cid D524无形资产cid L525分录cid D526管理会计cid L527手工调账cid D528应付票据cid L529应收票据cid L530其他应收款cid L531付款账龄cid D532工资支票cid D533缴款cid D534付款项目cid D535支付点cid D536支付状态cid D537付款方式cid D538催款单cid D539付款状态cid D540付款期限cid D541期间cid D542过账cid D543建议成本cid L544模拟成本cid L545开支差异cid L546明细账cid D547汇总cid D548税码cid D549税率cid D550增值税cid D551552截止日期dat D553修改批量日期dat D554结清日期dat D555调整日期dat D556有效日期dat D557修改日期dat D558结束日期dat D559截止日期dat560生产日期dat D561库存调整日期dat D562作废日期dat D563收到日期dat D564交付日期dat D565需求日期dat D566发货日期dat D567最早订单完成日期dat L568生效日期dat D569工程变更生效日期dat D570工程停止日期dat D571失效日期,报废日期dat D572起始日期dat D573最后运输日期dat T574需求日期dat D575新日期dat D576付款截止日期dat D577收到日期dat D578发运日期dat D579580已分配量sim D581字母数字sim C582批准者sim D583装配(件)sim D584未结订单/拖欠订单sim L585开单sim D587发票寄往地sim C588瓶颈资源sim L589散装sim D590采购员sim T591子件/组件sim L592客户sim D593交货sim D594需求sim D595说明sim D596离散sim D597工效学(人类工程学)sim L598设备、功能sim D599基本组件/特征件sim L600预测sim D601运费sim D602例假日sim D603实施sim D604配料、成分sim D605查询sim D606库存sim L607物料项目sim D608作业sim D609看板sim T610层次(级)sim D611负荷sim D612定位sim D613后勤保障体系;物流管理sim L614批次sim D615可选件sim L616逾期未付sim D617制造费用sim D618覆盖sim C619加班sim D620双亲(文件)sim D621零件sim D622虚拟件sim L623工厂,场所sim D624优先权sim D626优先权(级)sim D627采购sim628原形测试sim L629队列sim T630任务额,报价sim D631收款、收据sim D632全重排法sim C633汇款sim D634请购单sim L635退货sim D636滚动sim D637工艺线路sim L638计划表sim D639发运量sim D640交货地sim C641短缺sim D642损耗sim D643分摊sim D644报表sim D645子装配件sim D646供应商sim D647事务处理sim F648如果怎样-将会怎样sim C649650后减库存处理法ext T656前减库存处理法ext T657通用生产管理原则ext T658直接增减库存处理法ext T659帕拉图原理ext L660鼓点-缓冲-绳子ext T661开放数据库互连fromchen生产规划编制 fromchen在制品 fromchen快速成本回收制度fromchen会计信息系统 fromchen可接受质量水平 fromchen不买够买力会计fromchen保本分析fromchen帐面价值fromchen成本效益分析fromchen财务总监fromchen财务杠杆系数fromchen经济杠杆系数fromchen先进先出法 fromchen经济批量 fromchen后进先出法fromchen完全跟踪 fromchen线性规划 fromchen目标管理 fromchen价值工程 fromchen零基预算fromchen计算机辅助质量保证 fromchen数据库管理系统 fromchen网际协议 fromchen传输控制协议 fromchen高级流程工业fromAMT应用到应用(集成)fromAMT物品fromAMT物品存储fromAMT装配订单fromAMT现有库存余额fromAMT条形码fromAMT保税仓库fromAMT能力需求计划fromAMT变革管理fromAMT冷藏区fromAMT联合运输fromAMT进出口商品检验fromAMT竞争优势fromAMT集装箱fromAMT集装箱运输fromAMT连续补充系数fromAMT。

AvailabilityCascadesandRiskRegulation

AvailabilityCascadesandRiskRegulation
314. Adam B. Cox and Eric A. Posner, The Second-Order Structure of Immigration Law (November 2006)
315. Lior J. Strahilevitz, Wealth without Markets? (November 2006)
Timur Kuran
Follow this and additional works at:/
public_law_and_legal_theory
Part of the Law Commons
This Working Paper is brought to you for free and open access by the Working Papers at Chicago Unbound. It has been accepted for inclusion in Public Law and Legal Theory Working Papers by an authorized administrator of Chicago Unbound. For more information, please contact
312. Dennis W. Carlton and Randal C. Picker, Antitrust and Regulation (October 2006)
313. Robert Cooter and Ariel Porat, Liability Externalities and Mandatory Choices: Should Doctors Pay Less? (November 2006)
University of Chicago Law School

The New Security Bills and Japan' s Security Dilemma

The New Security Bills and Japan' s Security  Dilemma

The New Security Bills and Japan' s SecurityDilemma作者: Meng Xiaoxu Wang Shan作者机构: 不详出版物刊名: 现代国际关系:英文版页码: 47-58页年卷期: 2015年 第5期主题词: 日本自卫队 安全环境 法案 安全立法 民族主义 美国军队 军事力量 势力范围摘要:Using the excuse of a changing East Asian security environment, Japan's ruling coalition steered by nationalist Prime Minister Shinzo Abe coerced passage tla~s September ot tlae~r intended retorm leglslaUon designed to make a Japan a "normal" country by allowing collective self-defense and closer coordination with American troops. To throw off the restrictions of Japan's pacifist constitution, Abe utilized the 2015 Diet session to push forward national security legislation bills which differ from previous ones. With greater ability to respond to crisis and fewer restrictions on its military, Japan can now engage in regional hotspots. Since the legislation defines a broader range of situations as crises, it highlights the security dilemma post-war Japan is reacting to in Asia. The scope of Japan's self-defense forces will enlarge, the country will have a stronger will to engage in international disputes, and its relationship with China will be altered. Japan's domestic politics and diplomacy will be negatively affected.。

美国与印太盟国的天基情报监视侦察合作研究

美国与印太盟国的天基情报监视侦察合作研究

收稿日期:2018-12-30 修回日期:2019-02-11作者简介:高杨予兮(ORCID :0000-0002-6791-9236),女,1991年生,博士研究生,研究方向:美国战争与外交决策㊂美国与印太盟国的天基情报监视侦察合作研究高杨予兮(信息工程大学洛阳校区 洛阳 471003)摘 要 [目的/意义]印太地区是美国当前国家安全战略的重心㊂美国与印太盟国的天基情报监视侦察既是提高其太空军事能力的重要手段,也是美国调整印太联盟体系㊁遏制中国崛起的战略途径㊂对这一问题的研究有助于发现当前美国天基情报监视侦察能力的发展特点和趋势,为中国的应对和借鉴提供参考㊂[方法/过程]通过探究美国与印太盟国开展天基情报监视侦察合作的动因,从机制构建㊁装备建设㊁作战演练三方面分析其进行合作的具体措施,发现其合作的特点与趋势㊂[结果/结论]美国与印太盟国开展天基情报监视侦察合作的目的是调整印太联盟关系㊁整合印太联盟资源,以及重点遏制印太地区的大国竞争对手㊂主要途径包括确立情报共享机制㊁进行情报装备合作以及开展太空联合演习㊂呈现出从盟国双边合作向多边合作转变㊁从情报成果共享向情报系统共建转变㊁从应对地区争端向集中遏制中国转变的特点和趋势㊂关键词 美国 天基情报监视侦察 印太盟国 情报共享中图分类号 E 19 文献标识码 A 文章编号 1002-1965(2019)06-0007-06引用格式 高杨予兮.美国与印太盟国的天基情报监视侦察合作研究[J ].情报杂志,2019,38(6):7-12,29.DOI 10.3969/j.issn.1002-1965.2019.06.002On the Cooperation of the Space -based Intelligence ,Surveillance andReconnaissance among the United States and Its Indo -Pacific AlliesGao Yangyuxi(Information Engineering University ,Luoyang Campus ,Luoyang 471003)Abstract [Purpose /Significance ]Currently ,the Indo -Pacific region is the focus of national security strategy of the United States.The cooperation on space -based intelligence ,surveillance and reconnaissance among the United States and its Indo -Pacific Allies is not only an important means to improve itary capabilities in space ,but also a strategic way for U.S.to adjust the Indo -Pacific alliance sys⁃tem and contain China 's rise.The research on this issue will help to discover the characteristics and trends of current U.S.space -based in⁃telligence ,surveillance and reconnaissance ,and provides foundation for China to respond and learn from.[Method /Process ]This paper explores the motivations for the cooperation on space -based intelligence ,surveillance and reconnaissance among the U.S.and its Indo -Pacific allies ,analyzes the measures for the cooperation from the perspective of mechanism construction ,equipment construction ,and op⁃erational practice ,and summarizes the characteristics and trends of the cooperation.[Result /Conclusion ]The purposes of the cooperation are to adjust the relationship inside the Indo -Pacific alliance ,integrate the resources of the Indo -Pacific allies ,and contain competitors in this region.The main measures include establishing intelligence sharing mechanisms ,conducting intellectual equipment cooperation ,and conducting joint space wargames.It shows that the cooperation is transiting from bilateral to multilateral ,from the sharing of intelligence products to the co -construction of intelligence systems ,and from the general response to regional disputes to the specific containment of China.Key words the United States the space -based intelligence the Indo -Pacific allies intelligence sharing 根据美国‘太空作战“联合条令,天基情报监视侦察(Space -based Intelligence ,Surveillance and Recon⁃naissance )是指利用太空资产,同步整合各种传感器㊁资产和系统,针对某一目标或某一关注区域,或是持续㊁或是由事件驱动㊁或是按计划,采集其数据和信息㊂天基情报监视侦察包括天上持久红外(overhead per⁃第38卷 第6期2019年6月 情 报 杂 志JOURNAL OF INTELLIGENCE Vol.38 No.6June 2019sistent infrared,OPIR)监控㊁任务分配㊁信息收集等,能够执行包括预警㊁目标分析㊁威胁能力评估㊁态势感知㊁战斗毁伤评估和作战环境描述在内的各类任务[1]㊂奥巴马政府时期,美国推出 亚太再平衡”战略,提出要将美国的战略重心转向亚洲㊂特朗普政府又在此基础上提出 印太战略”,并在‘国家安全战略“‘国家军事战略“等重要政策文件中,表示中国㊁俄罗斯㊁朝鲜等印太国家对美国安全产生了重大威胁㊂印太地区作为世界上人口最多㊁经济发展最快的地区,已经日益成为美国利益汇聚的焦点和大国竞争的赛场,吸引了美国越来越多的战略投入㊂为了实现美国在印太乃至世界的霸权,美国通过加强与日本㊁韩国㊁澳大利亚等印太盟国的天基情报监视侦察合作,不断强化对地区安全形势的掌控㊂1 美国与印太盟国开展天基情报监视侦察合作的动因 2018年美国‘国防战略“认为,美国正面临着日益复杂的安全环境,其特点是对自由开放国际秩序的公然挑战以及国家间长期战略竞争的重新出现㊂这些变化需要美国对所面临的威胁进行清晰的评估,明确战争形态的变化,改革现有的作战方式[2]㊂出于提高太空优势㊁调整联盟关系和遏制主要对手的多重因素考虑,美国与印太盟国开展了一系列天基情报监视侦察合作,力求维护美国的全球霸权,重点管控印太地区大国竞争者的挑战㊂ 1.1 调整印太联盟关系 拉拢印太盟友㊁巩固联盟关系是美国开展合作的重要考量㊂自人类开发利用太空以来,太空合作就以其独特的高技术性㊁战略性和政治敏感性成为一种特殊的外交手段㊂冷战时期,美国扶植西欧㊁日本等盟国建立起天基情报监视侦察体系,共同对抗苏联㊂在此过程中,西欧和日本逐渐成为国际太空体系的核心玩家,为美国主导国际太空秩序发挥辅助作用㊂冷战后,随着太空多极化趋势的发展,美国的太空霸权受到挑战,美国的制天权和绝对安全受到威胁,美国需要进一步调整印太地区原有的联盟体系,推动联盟从冷战时形成的 轴毂”模式㊁冷战后的 扇形”模式向 雁阵型” 网状型”转变㊂具体来说,就是要整合过去以美日㊁美韩㊁美澳双边联盟为主导的印太地区联盟,形成盟国间多边合作㊁联合作战的联盟格局㊂奥巴马政府上台后,美国的将战略重心从中东转向亚太,亚太地区成为美国战略关注的重点㊂特朗普政府继而提出 印太战略”,要在地缘政治和地缘经济两方面对冲中国日益崛起的影响力,同时明确要求提升与盟国在海洋联合行动的能力,强化美国的 自由航行”㊂对美国来说,天基情报监视侦察合作作为一种展现盟国间相互信任的合作手段,有利于深化美国与印太盟国的联盟关系,进一步协调统一美国阵营在印太地区的立场㊂首先,天基情报监视侦察合作是美国向盟国提供安全保护的重要表现㊂当前,美国大多数的军事情报来源于天基资产,与盟国进行此方面的合作意味着美国对盟国的巨大信任,是双方深化军事合作的里程碑式成果㊂太空领域的敏感性和尖端性使得此类合作充满了象征性,是美国向盟国示好的重要标志㊂其次,天基情报监视侦察合作有利于美国掌握盟国的军事能力㊂美国为盟国提供的安全服务越多,对盟国的掌控力也就越大㊂美国不但指示盟国按照自己的需求发展能力,还要求盟国承担相当程度的科研和生产成本,不给美国造成过多负担㊂美国既能扩大其军事实力的绝对优势,又能够保证在联盟中占据主导地位㊂第三,美国的盟国欢迎进行天基情报监视侦察合作㊂美国在印太地区的盟国 日本㊁韩国与澳大利亚都对增强国家安全实力㊁扩展地缘政治影响力有着强烈需求㊂通过与美国的天基情报监视侦察合作,盟国的情报能力和太空能力都将得到很大提升,甚至直接或间接促进该国工业能力的发展㊂因此,这些国家对于与美国开展天基情报监视侦察合作充满热情㊂ 1.2 整合印太联盟资源 提高太空军事能力㊁利用盟国太空资源是美国开展合作的直接目标㊂科学技术的发展使更多国家开始借助太空寻求军事优势,不断拉近与美国的实力差距㊂冷战时期,太空还只是少数西方发达国家的专属领地,实现太空军事利用的国家更是少之又少㊂1990年,美国在海湾战争中大量运用军事卫星为地面作战提供服务保障,标志着战争正式进入太空时代㊂这从一方面彰显了美国强大的军事实力,也从另一方面宣传了太空力量的巨大效果,促使更多国家寻求㊁强化对太空的军事利用㊂从1961年7月到2018年4月,全世界一共登记发射了571颗军用卫星,其中仅在2010年到2018年4月就发射了128颗㊂而在2017年发射的12颗军用卫星中,美国仅占1/6[3]㊂其中,印太国家的太空军事发展更呈现出整体崛起的形势[4]㊂印度在2007年发射了首颗军事侦察卫星,并在印度陆军公布的文件‘太空展望2020“中明确提出向太空要 战斗力”[5]㊂伊朗㊁朝鲜等发展中国家也都纷纷拥有了自己的军事卫星㊂此外,太空的军民两用性和太空商业化的发展也使太空军备竞赛更加复杂㊂据统计,军事卫星大约占所有航天器的8%左右,但可以用于军事目的的航天器却占到70%,实际所占比例可能还会更高[6]㊂太空军事利用的普及让美国担心无法继续维持其在太空得天独厚的战略优势,㊃8㊃ 情 报 杂 志 第38卷继续强化太空军备成为美国的优先选择㊂在其他国家热衷追求太空军备发展的同时,美国自身却面临着太空装备采办进度滞后㊁太空资产更加脆弱等问题㊂美国国防部卫星系统的采办成本在不断攀升㊂2016年前后,国防部卫星的单位成本在5亿到30多亿美元之间,地面系统的成本可能高达35亿美元㊂仅发射一颗卫星的成本就超过1亿美元㊂用于导弹预警的天基红外系统(Space Based Infrared System High,SBIRS High)的成本增加了近3倍,第一颗卫星的发射比原计划推迟了9年[7]㊂天基情报监视侦察技术和设备研发慢㊁部署慢㊁战斗力形成慢的特性让美国很难在短时间内突破技术瓶颈㊁迅速提升情报力量㊂另一方面, 拥挤㊁竞争㊁对抗”的太空环境让美国现有的太空资产更加脆弱㊂据统计,太空中直径大于10厘米的碎片和人造物体已经超过2.2万个[8],在1到10厘米之间的物体则超过50万个[9]㊂太空碎片㊁太空撞击及各类太空攻击手段日趋增多,让太空能力最强大的美国成为太空资产最易受到破坏的国家㊂在这样遍布威胁的太空环境中,美国需要通过提高冗余度㊁系统分散化等保证美国的太空能力不受削弱,而与盟国的合作能以最小的成本实现这一目标㊂在天基情报监视侦察领域,鉴于美国国内资源有限,美国要实现对印太地区的情报掌控,必须借助盟国的力量㊂首先,与盟国合作构建天基情报监视侦察网络,能够为美国的太空能力 提供多样化的来源”[10],避免出现因太空资产受损而丧失能力的情况,也能通过太空联盟拉大与对手的实力差距㊂其次,与盟国开展天基情报监视侦察合作能够帮助美国实现其情报网络的全球覆盖,尤其是增加在印太地区执行任务的频率㊁范围和精度,赋予其更强的机动性和准确性㊂ 1.3 重点遏制对手国家 遏制大国对手㊁抗衡中俄竞争是美国开展合作的战略意图㊂在2012年奥巴马政府公布的国防战略中,美国国防部表示将确保美国对任何区域的自由进入和自由行动,防范中国引起的地区摩擦[11]㊂特朗普政府上台后,更加明确地将对手指向中㊁俄等国,把大国竞争作为这一时期美国面临的主要威胁㊂2018年‘国防战略“指出,美国当前面临的最大挑战是来自中㊁俄等 修正主义国家”的挑战㊂中国正利用其军事现代化重新塑造地区秩序,而俄罗斯正利用新科学技术来削弱和破坏周边国家㊂ 中国和俄罗斯正利用其利益削弱二战后美国塑造的国际秩序”㊂[2]美国将新兴大国的崛起视为对其既得利益的威胁,因此力图借助太空能力等新型军事力量遏制对手国家的活动,美国为此将太空定义为与海㊁陆㊁空㊁网并列的 作战域”,强调太空力量对联合作战发挥的关键作用㊂除了地缘政治中的大国竞争考量,美国还对中俄两国的太空军事能力深感警惕㊂在‘太空安全战略“‘国家太空政策“等文件中,美国多次强调其太空安全正受到威胁,担忧其太空力量的军力 倍增器”作用受到来自对手国家的破坏,打破美国由太空能力带来的不对称作战优势㊂作为苏联的主要继承者,俄罗斯以苏联时期的太空力量为基础,发展了实力强大㊁体系健全太空军事力量指挥体制和太空军事装备系统㊂截至2017年8月,俄罗斯共有运行卫星142颗,其中军事卫星85颗[12]㊂其中,格洛纳斯(GLONASS)导航卫星系统至今已发展至第三代,性能可与美国的GPS导航系统媲美; 角色”(Persona)㊁ 猎豹-M”(Bars-M)等军用光学侦察卫星处于世界先进水平;俄罗斯的反导㊁反卫星能力也非常出色,能对美国的航天器构成巨大威胁㊂更为关键的是,在美国的制裁下,俄罗斯财政和技术能力受到限制,在太空力量发展上表现出与中国合作的强烈意愿㊂中俄已经于2017年签署太空合作协议,内容涵盖深空探测㊁材料研发㊁卫星系统㊁地球遥感㊁太空态势感知等多个方面㊂俄罗斯不仅宣布要退出国际空间站㊁与中国合作开发新的空间站,还在重型火箭制造㊁导航卫星系统等方面与中国开展合作㊂目前,中俄两国正在积极推动北斗导航系统与格洛纳斯导航系统的融合,并计划建立一个太空联合数据中心㊂这些合作举措都将极大增强两国的太空力量,有效提高两国在太空信息支援条件下的联合作战能力㊂为了保持美国在太空这一战略制高点的绝对优势,美国需要进一步强化天基情报监视侦察力量,扩大与中俄等主要对手的力量差距㊂2 美国与印太盟国开展天基情报监视侦察合作的举措 盟国是美国国家安全的支柱,曾任美国国家安全助理的多尼隆(Donilon)就明确指出, 虽然印太地区发生了众多变化,但有一点没有改变:美国以前在这一地区的盟国,将会继续成为美国现在的战略基础”[13]㊂为了提高美国的天基情报监视侦察能力和对印太地区的影响力,美国与日本㊁韩国和澳大利亚等主要盟国确立了情报共享机制㊁开展了一系列装备系统合作,同时定期进行军事演习,不断提高联盟太空作战能力㊂ 2.1 确立天基情报共享机制 为了统一与盟国在天基情报监视侦察领域的合作立场,美国与盟国开展了多次太空安全对话,探讨在太空情报共享方面的合作途径㊂日本一直对发展太空军事力量有着强烈意愿㊂2011年美日部长级会议上,美国和日本就将共享太空资源作为美日联盟的共同战略目标,2012年,两国领导人发表共同声明,表明重视和积极扩大美日太㊃9㊃ 第6期 高杨予兮:美国与印太盟国的天基情报监视侦察合作研究空合作的共同立场㊂2013年至今,美国已经与日本进行了5次 全面太空对话”(Comprehensive Dialogue on Space),已经形成了年度例行的会议机制,理清了双方相关机构之间的合作关系,成为两国协调天基情报监视侦察合作的重要平台㊂在第一次 全面太空对话”会议上,美日就建立太空海域态势监视(Space-based Maritime Surveillance)情报共享机制达成协议㊂2015年4月,两国将 共享探查和识别可疑卫星与太空态势感知情报,并合作利用卫星监视海洋”等内容写入新版‘美日防卫合作指针“[14]㊂根据新增条款,美日同意在天基情报监视侦察领域开展合作,就可能影响地区安全和稳定的事件共享情报资源,尤其加强在海洋领域情报监视侦察资源的共享㊂澳大利亚是美国在印太地区的 南锚”,与澳大利亚的天基情报监视侦察合作不但具有战略意义,更能有效帮助美国提升在南半球地区的情报搜集能力㊂2010年,美澳两国举行国防部长会谈,共同签署了美澳太空‘谅解备忘录“,同意在天基情报搜集㊁评估㊁分发领域开展合作[15]㊂2014年,时任美国国防部常务副部长罗伯特㊃沃克(Robert Walker)首次公开提出了第三个 抵消战略”(Offset Strategy)概念,将构建全球太空监视与打击网络作为该战略的重要支撑[16]㊂此外,美国与澳大利亚还进一步深化了两国在 五眼联盟”的情报合作,扩大这一盟国情报共享组织的合作范围,意图强化联盟天基情报搜集的整体力量㊂美国与韩国之间也进行着日益紧密的太空安全磋商㊂2014年9月,美韩举行国防部长会谈,达成‘谅解备忘录“㊂根据这一文件要求,美国将向韩国提供更优质㊁及时的天基情报,而韩国将为美国提供卫星位置和无线电频率的情报㊂2015年1月,美韩双方在华盛顿举行首次太空政策对话,双方商定进一步加强天基情报监视侦察合作,实现双方情报共享从地基向天基的转变㊂2016年,朝鲜第四次核试验后,韩国宣布将和美国共享天基红外系统(SBIRS)搜集的情报[17]㊂ 2.2 开展天基情报监视侦察装备合作 为了减少美国的财政支出㊁最大化整合利用盟国的太空资源,美国在天基情报监视侦察的装备建设上与盟国开展密切合作㊂早在2006年,美国就与日本签订了导弹防御情报网互联协定,通过统一情报标准和数据系统,将日本的地面雷达网㊁日本购买的 宙斯盾”舰雷达网与美国的预警卫星和雷达系统互联,实现美国与日本在导弹防御方面的天基情报监视侦察装备系统融合㊂美国还协助日本研发侦察卫星,弥补美国在东亚地区的情报力量不足[18]㊂2015年,新修订的‘美日防卫合作指针“首次以一整段的篇幅强调两国的太空合作,明确两国将共同确保太空系统的弹性,在 托管有效载荷”(以民用卫星携带军用载荷)等方面开展装备合作,并在太空能力遭到破坏时重组两国天基情报监视侦察资源,对接和共用双方的天基情报监视侦察网络[19]㊂早在冷战时期,美国便在澳大利亚设立了多个卫星接收站,用于接收㊁处理和分发来自美国天基情报监视侦察系统的数据㊂其中最重要的就是位于澳大利亚中部的松峡(Pine Gap)基地,该基地主要用于操控美国在太平洋和印度洋上空地球静止轨道上的侦察卫星,为美国及其盟友收集印太地区的情报㊂基地最初完全由美国建造㊁控制和使用,澳大利亚人甚至被禁止进入基地所在区域[20]㊂随着美澳天基情报监视侦察合作的深入,该基地逐渐成为美澳共有的联合设施,由美国和澳大利亚共同管理和使用㊂2009年,澳大利亚国防部宣布将对松峡基地的天线阵地进行升级,这次升级由澳大利亚本土承包商完成,计划更新老化的设备,并应用更先进的技术㊂到2016年,松峡基地已经拥有33组大型天线,几乎是其在冷战结束时天线数量的2倍[21]㊂澳大利亚2009年颁布的国防白皮书明确表示,松峡基地这一联合防御设施是美澳战略合作的典范,是维护澳大利亚安全和美澳同盟关系的关键因素[22]㊂ 2.3 举办天基情报监视侦察联合演习 为了提升印太盟国在天基情报监视侦察领域的实战水平,强化美国与盟国在太空联合作战的能力,美国多次邀请印太盟国进行天基情报监视侦察领域的联合军事演习,意图在锻炼联盟作战能力的同时,向外界传递美国阵营太空实力强大的信号,发挥太空威慑效果㊂施里弗军演”(Schriever Wargame)是美国最重要的太空军事演习,到2018年底已经举办了12次,天基情报监视侦察始终是 施里弗军演”的主要内容之一㊂从2010年第6次 施里弗军演”开始,美国力邀各盟国加入太空作战演习,澳大利亚成为率先参与这一演习的盟国之一,主要在盟国太空作战系统配合㊁进行太空态势感知和情报监视侦察等领域开展演练㊂2018年的 施里弗军演”还首次邀请了日本参与,演习假想在印太地区有大国意图通过太空攻击实现战略目标,显示了美国重点关注印太地区大国竞争㊁强化印太联盟太空作战能力的战略意图㊂通过与印太盟国开展太空军演,美国密切了与联盟在天基情报监视侦察领域的合作关系,也进一步凸显了美国在太空作战中的主导地位㊂2014年开始,美国还联合澳大利亚等盟国开展了 全球哨兵”太空态势感知桌面演习,日本于2015年成为正式参演国,韩国于2017年作为观察员国家参与了演习㊂ 全球哨兵”系列演习至今已经举办5次,演习规模不断扩大㊂相比施里弗军演, 全球哨兵”演习㊃01㊃ 情 报 杂 志 第38卷集中于太空态势感知领域,更加强调与盟国的协调合作㊂美国不但在演习中提高与盟国的太空系统互操作性和部队协同能力,更对盟国的太空态势感知装备进行测试和改进,力求形成一体化的太空态势感知指挥控制体系㊂此外,美国还积极在其他军事演习中与盟国演练天基情报监视侦察任务㊂在以往与韩国的军事演习中,美国通常独立进行太空领域的相关任务,但自2012年4月美韩举行的 乙支自由卫士”联合军演以后,美国开始与韩国共同开展天基情报监视侦察演习,扩大了美韩传统联合军演的形式与内容㊂韩国军方发言人表示: 通过与美国在太空领域的联合军事演习,两国可以在利用美国情报卫星搜集情报,利用韩国地缘优势安置先进卫星雷达情报侦察设备等方面进行全面合作㊂”[23]3 美国与印太盟国的天基情报监视侦察合作的特点 美国与印太盟国的天基情报监视侦察合作呈现出由双边向多边合作转变㊁由情报成果共享向情报装备共建转变㊁由应对地区争端向遏制中国转变的特点㊂这些特点同时也体现了未来一段时间内美国在印太地区开展天基情报监视侦察合作的趋势 强化多边合作㊁促进装备合作㊁集中针对中国㊂ 3.1 从盟国双边合作向多边合作转变 从奥巴马政府的 亚太再平衡”到特朗普政府的 印太战略”,实质都是要通过扶持印太地区盟国,打造制衡中国崛起的联盟网络㊂随着中国的实力增强,冷战时期形成的 轴毂”模式㊁冷战后的 扇形”模式已经不再能满足遏制中国的需要,美国开始寻求在印太打造类似 北约”那样的多边联盟模式㊂同时,美国也希望促使盟国承担更多的地区安全责任,从而让美国只需扮演 离岸平衡手”的角色,避免与中国的直接对抗㊂在这样的战略思想指引下,美国在原先的美日㊁美韩㊁美澳等双边安全对话基础上,先后启动美日澳㊁美日韩三边安全对话机制,并努力拉拢印度,争取实现美日印澳 四国同盟”,力促印太联盟转为美国主导㊁盟国协作的 雁阵型”联盟格局㊂在天基情报监视侦察领域,美国着力通过引导印太盟国间情报共享,在印太地区打造全方位㊁立体化的多边天基情报监视侦察网络,同时捆绑盟国利益,塑造联盟内部共同的战略目标和价值观㊂在美国的扶持下,日本凭借其先进的天基情报监视侦察能力成为美国在印太地区情报合作的 次轴心”㊂2008年,日本与澳大利亚签订情报共享的谅解备忘录㊂2014年,美国㊁日本㊁韩国签订‘关于朝鲜核与导弹威胁的情报交流协议“,使日韩两国可以通过美国共享关于朝鲜核导弹威胁的情报㊂2016年11月,日韩两国签订‘军事情报保护协定“,允许两国直接交换包括朝鲜核威胁在内的各种军事情报㊂由于日韩两国国内长期龃龉,两国过去在情报交流方面进展缓慢,而这项协议仅用一个月时间就完成了谈判,除了两国应对朝鲜核危机的迫切心理,美国的支持和推动也是关键因素㊂在确立多边情报共享机制之外,美国还将原有的双边军事演习发展为美日韩㊁美日澳㊁美日印澳等多边军事演习,并扩大太空军事演习的规模,澳大利亚㊁日本㊁韩国等先后参与到 施里弗军演” 全球哨兵”军演中,与美国在天基情报监视侦察领域开展更为深入的实战演练㊂ 3.2 从情报成果共享向情报系统共建转变 奥巴马政府时期,美国面临金融危机造成的财政紧张,无法为天基情报监视侦察系统升级㊁功能提升提供充裕的资金㊂在此情况下,美国开始寻求与盟国在天基情报监视侦察装备系统建设上进行合作,借助盟国的资源实现美国能力的提升㊂特朗普政府上台后,强调 美国优先”,主张让盟国全权承担美国的安全保护成本,更加强调美国不能单方面地为盟国提供安全保护,盟国也需要承担相应的成本㊁甚至提供回报㊂在天基情报监视侦察领域,由于美国与印太盟国在实力上存在巨大差距,美国过去与盟国签订的情报共享协议虽然是双方的情报共享,实际上更多是美国为盟国提供情报服务,利用美国的技术和装备向盟国通报特定领域的情报成果㊂近年来,随着盟国太空技术水平的上升以及应对地区安全局势的主动性增强,美国与印太盟国在天基情报监视侦察装备建设方面的合作不断深入㊂除了在技术上支持盟国研发侦察卫星㊁运载火箭等,还不断在盟国设立天基情报监视侦察接收站;不但在平时与盟友实现天基情报监视侦察网络的对接互联,还明确在战时将会对联盟天基装备进行重组共建㊂这种情报装备的共建不仅意味着美国对盟国情报资源和军事资源的进一步控制,将直接带来未来联盟协同作战能力的提高;更将美国联盟的太空利益捆绑在一起 任何对美国天基情报监视侦察资产的攻击都将被视为对整个联盟的挑衅㊂天基情报监视侦察资产的多国共有属性将有效发挥太空威慑作用,让对手因担忧引发多个国家的报复而放弃攻击㊂ 3.3 从应对地区争端向集中遏制中国转变 美国与印太盟国的天基情报监视侦察合作已经明显呈现出针对中国的趋势㊂一方面,美国强化与印太盟国的合作,本身就是向印太地区增加战略资源㊁遏制平衡中国崛起的举措之一;另一方面,为了确保美国在印太地区㊃11㊃ 第6期 高杨予兮:美国与印太盟国的天基情报监视侦察合作研究。

国家建筑标准设计图集02S404中的柔性防水套管解析与应用

国家建筑标准设计图集02S404中的柔性防水套管解析与应用

国家建筑标准设计图集02S404中的柔性防水套管解析与应用张 莹(北京凯盛建材工程有限公司)摘 要:本文通过深度解析研究国家建筑标准设计图集02S404《防水套管》(以下简称《标准图集》),结合该标准图集自2002年12月1日执行以来的实际工作经验,特别是“一带一路”哈萨克斯坦、乌兹别克斯坦等水泥生产线建设项目中所发现的问题。

首次在工业、民用建筑领域内提出对称型、双支点、纯柔性可拆卸式穿墙柔性防水套管的新结构,纠正了现有《标准图集》中柔性防水套管结构中的不妥之处。

包括定义错误、相互矛盾以及违背设计、施工验收规范之处,同时弥补现有人民防空地下室相关标准及图集中缺失柔性防水套管的结构型式,为今后修订国家标准、设计及施工图集提供相关依据。

此项技术荣获国家4项发专利,并解决了水泥生产设备的管线埋设时合理穿越构(建)筑物结构墙体密封防水的相关技术难题。

关键词:柔性防水套管,介质管道,密封结构DOI编码:10.3969/j.issn.1674-5698.2021.03.015Study on Flexible Waterproof Casing in National BuildingDesign Standard Atlas 02S404ZHANG Ying(Beijing Triumph International Engineering Co., Ltd.)Abstract: This paper studies the national building design standard atlas 02S404. Combined with the practical work experience of the standard atlas since December 1, 2002, especially the problems found in the cement production line construction projects in Belt and Road countries including Kazakhstan and Uzbekistan. It puts forward the new structure of flexible waterproof casing with symmetrical, double-pivot, detachable and through-the-wall features applied in the field of industrial and civil construction for the first time. It corrects the deficiencies of the flexible waterproof casing in the existing standard, including wrong definition, contradictions and breach of design and acceptance specifications.It also makes up the lack of flexible waterproof casing structure in existing standards and atlas on basements for air defense, providing a reference for the revision of relevant national standards and the design and construction atlas in the future. This technology has obtained four national patents, and solved the technical problem of cement production equipment passing through the external wall of structure.Keywords: flexible waterproof casing, medium pipe, sealing structure作者简介:张莹,本科,工程师, 研究方向为水泥生产线机电设备管线。

Security Criteria

Security Criteria

Security Criteria for C-TPAT Sea CarriersSince October 2004, CBP and the trade community have worked collaboratively to develop minimum-security criteria for importers and carriers already enrolled in the C-TPAT program, or wishing to join this voluntary supply chain security program. These new minimum-security criteria help solidify membership expectations, and more clearly define and establish the baseline level of security measures which must be employed by member importers. These security criteria for sea carriers becomes effective as of March 1, 2006. An implementation plan has been implemented and applies to all sea carrier members of C-TPAT. Please refer to the linked documents for all of details.C-TPAT Security CriteriaSea CarriersSea carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Where a sea carrier does not control a specific element of the cargo transportation service it has contracted to provide, such as marine terminal operator or a time chartered vessel with whom it has contracted, the sea carrier must work with these business partners to seek to ensure that pertinent security measures are in place and adhered to. The sea carrier is responsible for exercising prudent oversight for all cargo loaded on board its vessel, pursuant to applicable law and regulations and the terms of this program.C-TPAT recognizes the complexity of international supply chains and security practices, and endorses the application and implementation of security measures based upon risk.1 Therefore, the program allows for flexib ility and the customization of security plans based on the member’s business model. Security measures, as listed throughout this document, must be implemented and maintained as appropriate to the carrier’s business model and risk understanding. CBP’s C-TPAT validation process shall include a review of the carrier’s assessment and program.C-TPAT recognizes that sea carriers are already subject to defined security mandates created under the International Ship and Port Security Code (ISPS) and the Maritime Transportation Security Act (MTSA). It is not the intention of C-TPAT to duplicate these vessel and facility security requirements, rather, C-TPAT seeks to build upon the ISPS and MTSA foundation and require additional security measures and practices which enhance the overall security throughout the international supply chain.ISPS and MTSA compliance are a prerequisite for C-TPAT sea carrier membership, and only vessels in compliance with the applicable ISPS code requirements may be utilized by C-TPAT members. Marine terminals operated by C-TPAT members must also comply with ISPS code requirements. The Physical Access Controls and Physical Security provisions of these criteria are satisfied for ISPS regulated vessels and port facilities by those ves sels’ or facilities’ compliance with the ISPS Code and Coast Guard regulations.Business Partner RequirementsSea carriers must have written and verifiable procedures for the screening of carrier’s agents and service providers contracted to provide transportation services for the carrier. Sea carriers must also have screening procedures for new customers, beyond financial soundness issues to include indicators of whether the customer appears to be a legitimate business and/or posses a security risk. Sea carriers shall also have procedures to review their customer’s requests that could affect the safety of the vessel or 1 Sea carriers shall have a documented and verifiable process for assessing security vulnerabilities within their operations based on their business model (i.e., volume, country of origin, routing, security alerts via open source information, ports identified by U.S. Coast Guard as having inadequate security, past security incidents, etc.).the cargo or otherwise raise significant security questions, including unusual customer demands, such as specific stowage placement aboard the vessel (beyond a request for below deck or on deck stowage).∙Security proceduresSea carriers must have written or web-based procedures for screening new customers to whom they issue bills of lading, which identify specific factors or practices, the presence of which would trigger additional scrutiny by the sea carrier, up to and including a detailed physical inspection of the exterior of the suspect customer’s container prior to loading onto the vessel. These procedures may also include a referral to CBP or other competent authorities for further review. CBP will work inpartnership with the sea carriers to identify specific information regarding what factors, practices or risks are relevant.Sea carriers should ensure that contract vessel services providers commit to C-TPAT securityrecommendations. Periodic reviews of the security commitments of the service providers should be conducted.2Container SecurityFor all containers in the sea carrier’s custody, container integrity must be maintained to protect against the introduction of unauthorized material and/or persons. Sea carriers must have procedures in place to maintain the integrity of the shipping containers while in their custody. A high security seal must be affixed to all loaded containers bound for the U.S. All seals used or distributed by the sea carrier must meet or exceed the current PAS ISO 17712 standards for high security seals3.Sea carriers and/or their marine terminal operators must have processes in place to comply with seal verification rules and seal anomaly reporting requirements once promulgated and mandated by the U.S. government.∙Container InspectionThe requirement to inspect all containers prior to stuffing (to include the reliability of the lockingmechanisms of the doors) is placed upon the importers through the C-TPAT Minimum SecurityCriteria for Importers dated March 25, 2005. Sea carriers must visually inspect all U.S.-bound empty containers, to include the interior of the container, at the foreign port of lading∙Container SealsWritten procedures must stipulate how seals in the sea carrier’s possession are to be controlled.Procedures should also exist for recognizing and reporting compromised seals and/or containers to US Customs and Border Protection or the appropriate foreign authority consistent with the sealanomaly reporting requirements once promulgated and mandated by the U.S. government.∙Container StorageThe sea carrier must store containers in their custody in a secure area to prevent unauthorizedaccess and/or manipulation. Procedures must be in place for reporting detected, unauthorized entry into containers or container storage areas to appropriate local law enforcement officials.Physical Access Controls2 An ISPS regulated vessel operator or port facility is not expected under these criteria to show a carrier or other third party its ship or port security plan. It is recognized that under the ISPS Code relevant portions of an ISPS security plan are not subject to in spection without the contracting government’s agreement.3 When a container has been affixed with a high security seal that meets or exceeds the current PAS ISO 17712 standards and the shipper or carrier wishes to apply a supplementary, additional seal to the container to provide enhanced level of security, such supplementary seals do not have to meet the PAS ISO 17712 standards.The sea carrier shall establish access controls to prevent unauthorized entry to its vessels and cargo facilities, maintain control of employees and visitors, and protect company assets. Access controls must include the positive identification of all employees, visitors, service providers, government officials and vendors at all restricted access points of entry. Shore employees and service providers should only have access to those areas of the vessel where they have legitimate business. Vessel and facility access controls are governed by the International Ship and Port Security Code and MTSA. The Physical Access Control provisions of these criteria are satisfied for ISPS regulated vessels and port facilities by those vessels’ or facilities’ compliance with the ISPS C ode and MTSA regulations.∙Boarding and Disembarking of VesselsConsistent with the vessel’s ISPS security plan, all crew, employees, vendors and visitors may be subject to a search when boarding or disembarking vessels. A vessel visitor log must be maintained and a temporary visitor pass must be issued as required by the vessel’s security plan. Allcrewmembers, employees, vendors and visitors, including government officials, must display proper identification, as required by the applicable ISPS/MTSA security plan.∙EmployeesAn employee identification system must be in place for positive identification and access control purposes. Employees should only be given access to those secure areas needed for theperformance of their duties. Company management or security personnel must adequately control the issuance and removal of employee, visitor and vendor identification badges. Procedures for the issuance, removal and changing of access devices (e.g. keys, key cards, etc.) must be documented. ∙Visitors / Vendors / Service ProvidersVisitors, vendors, government officials, and service providers must present photo identification for documentation purposes upon arrival at carrier’s vessels or cargo facilities, and a visitor log must be maintained. Measures described by the approved ISPS/MTSA security plan addressing the escort of visitors and service providers, including, when appropriate, the use of temporary identification will be followed.∙Challenging and Removing Unauthorized PersonsProcedures must be in place to identify, challenge and address unauthorized/unidentified persons. Personnel SecurityIn compliance with applicable laws and regulations for that location, written and verifiable processes must be in place to screen prospective employees and to periodically check current employees.∙Pre-Employment VerificationApplication information, such as employment history and references must be verified prior toemployment.∙Background checks / investigationsDepending on the sensitivity of the position, background checks and investigations shall beconducted for prospective employees as appropriate and as required by foreign, federal, state and local regulations. Once employed, periodic checks and reinvestigations should be performed based o n cause, and/or the sensitivity of the employee’s position.∙Personnel Termination ProceduresCompanies must have procedures in place to remove identification, facility, and system access for terminated employees.∙Crewmen Control – Deserter/Absconder RiskCBP will work with the U.S. Coast Guard and sea carriers to identify specific factors which mayindicate when a crewman poses a potential risk of desertion/absconding. When such factors are identified and provided to the carriers, the carrier shall provide this information to its vessel mastersand to the vessels under charter to the carrier, and such vessels shall establish procedures toaddress the potential risk of desertion/absconding. Added security measures appropriate to the risk present should be employed upon arrival into the U.S. port/territories.∙Deserter/Absconder NotificationsVessel masters must account for all crewmen prior to the vessel’s departure from a U.S. port. If the vessel master discovers that a crewman has deserted or absconded, the vessel master must report this finding by the most practical means to CBP immediately upon discovery and prior to the vessel’s departure.Procedural SecuritySecurity measures must be in place to ensure the integrity and security of processes relevant to the transportation, handling, and storage of cargo. Consistent with the carrier’s ISPS Code security plan, procedures must be in place to prevent unauthorized personnel from gaining access to the vessel. In those geographic areas where risk assessments warrant checking containers for human concealment in containers, such procedures should be designed to address the particular, identified risk at the load portor the particular port facility. CBP will inform the sea carriers when it is aware of a high risk of human concealment or stowaways at particular ports or geographic regions. Documented procedures must also include pre-departure vessel security sweeps for stowaways at the foreign load port, and during normal watch activity while en route to the United States as warranted by risk conditions at the foreign load port. ∙Passenger and CrewSea carriers must ensure compliance with the U.S. Coast Guard Notice of Arrival and Departurerequirements so that accurate, timely and advanced transmission of data associated withinternational passengers and crew is provided to the U.S. government and CBP.∙Bill of Lading / Manifesting ProceduresProcedures must be in place to ensure that the information in the carrier’s cargo manifest accurately reflects the information provided to the carrier by the shipper or its agent, and is filed with CBP in a timely manner. Documentation control must include safeguarding computer access and information.Bill of lading information filed with CBP should show the first foreign port (place) where the sea carrier takes possession of the cargo destined for the United States.∙BAPLIEsAt the request of CBP, sea carriers will provide a requested BAPLIE and/or stowage plan, in a format readily available. Such requests will be made on a voyage specific basis when CBP requiresadditional voyage information and will be honored by the sea carrier in a timely manner. CBPrecognizes that these are not regulated documents and that the data included may not always match the manifest filing.∙CargoCustoms and/or other appropriate law enforcement agencies must be notified if illegal or highlysuspicious activities are detected - as appropriate.Security Training and AwarenessA security awareness program should be established and maintained by the carrier to recognize and foster awareness of security vulnerabilities to vessels and maritime cargo. Employees must be made aware of the procedures the sea carrier has in place to report a security concern or incident. Additionally, specific training should be offered to assist employees in maintaining vessel and cargo integrity, recognizing internal conspiracies, and protecting access controls.Physical SecurityCarriers shall establish written and verifiable procedures to prevent unauthorized personnel from gaining access to its vessels, including concealment in containers, and to prevent tampering with cargo conveyances while they are in the carrier’s custody. Such measures are covered by a vessel’s and a port fa cility’s ISPS security plan. Physical Security provisions of these criteria are satisfied for ISPS regulated vessels and port facilities by those vessels’ or facilities’ compliance with the ISPS Code and MTSA regulations. Non-ISPS Code regulated cargo handling and storage facilities and container yards operated by the carrier, in domestic and foreign locations, must have physical barriers and deterrents that guard against unauthorized access. Sea carriers should incorporate the following C-TPAT physical security criteria as applicable.∙FencingPerimeter fencing should enclose the areas around cargo handling and storage facilities, container yards, and terminals. All fencing must be regularly inspected for integrity and damage.∙Gates and Gate HousesGates through which vehicles and/or personnel enter or exit must be manned and/or monitored and secured when not in use.∙ParkingPrivate passenger vehicles should be prohibited from parking in or adjacent to cargo handling and storage areas, and vessels.∙Building StructureBuildings must be constructed of materials that resist unlawful entry. The integrity of structures must be maintained by periodic inspection and repair.∙Locking Devices and Key ControlsAll external and internal windows, gates and fences must be secured with locking devices.Management or security personnel must control the issuance of all locks and keys.∙LightingAdequate lighting must be provided inside and outside the facility including the following areas: entrances and exits, cargo handling and storage areas, fence lines and parking areas. While at port, the pier and waterside of the vessel must be adequately illuminated.∙Alarms Systems & Video Surveillance CamerasAt those locations determined appropriate by the c arrier’s risk assessment, alarm systems and video surveillance cameras should be utilized to monitor premises and prevent unauthorized access to vessels, cargo handling and storage areas.Information Technology Security∙Password ProtectionAutomated systems must use individually assigned accounts that require a periodic change ofpassword. IT security policies, procedures and standards must be in place and provided toemployees in the form of training.∙AccountabilityA system must be in place to identify the abuse of IT including improper access, tampering or thealtering of business data. All system violators must be subject to appropriate disciplinary actions for abuse.Security Assessment, Response and ImprovementCarriers and CBP have a mutual interest in security assessments and improvements, and recognize that specific, implemented security procedures may be found in the future to have weaknesses or be subject to circumvention. When a security shortcoming or security incident is identified, the Carrier and CBP officials will meet in an effort to ascertain what led to the breakdown and to formulate mutually agreed remedial measures. If CBP determines that the security incident raises substantial concerns or a security weakness requires substan tial remediation, CBP headquarters officials will meet with the carrier’s senior management to discuss such concerns and to identify appropriate remedial measures to be taken. While CBP has the authority to suspend or remove a sea carrier from the C-TPAT program for substantial non-compliance with the security criteria of the program, such authority is exercised only in the most serious circumstances.。

轻钢装配式建筑标准化施工质量控制措施探讨

轻钢装配式建筑标准化施工质量控制措施探讨

工程建设标准化轻钢装配式建筑标准化施工质量控制措施探讨■ 刘俊艳(甘肃省集成装配式建筑产业发展有限公司)摘 要:轻钢装配式建筑是一种新型的建筑形式,具有高效、环保、可拆卸等特点,被广泛应用于工业、商业、住宅等领域。

然而,其施工质量问题一直是业界关注的焦点。

通过实施标准化施工控制措施,可以有效提高轻钢装配式建筑的施工质量,促进其可持续发展。

本文主要分析了轻钢装配式建筑施工存在的质量问题,探讨了轻钢装配式建筑标准化施工质量控制措施,以促进轻钢装配式建筑标准化施工的顺利进行,实现高质量、高效率、低成本的安全施工目标。

关键词:轻钢装配式建筑,标准化施工,质量控制,措施DOI编码:10.3969/j.issn.1002-5944.2023.24.038Discussion on Standardized Construction Quality Control Measures forLight Steel Prefabricated BuildingsLIU Jun-yan(Gansu Province Integrated Prefabricated Construction Industry Development Co., Ltd.)Abstract:Light steel prefabricated buildings are a new type of building form with characteristics such as high efficiency, environmental protection, and dismantling. They are widely used in industrial, commercial, residential and other fi elds. However, the construction quality issue has always been the focus of attention in the industry. By implementing standardized construction control measures, the construction quality of lightweight steel prefabricated buildings can be effectively improved and their sustainable development can be promoted. This article mainly analyzes the quality problems in the construction of light steel prefabricated buildings, explores the quality control measures for standardized construction of light steel prefabricated buildings, in order to promote the smooth progress of standardized construction of light steel prefabricated buildings and achieve the goal of high-quality, high-effi ciency, and low-cost safety construction.Keywords: light steel prefabricated buildings, standardized construction, quality control, measures轻钢装配式建筑是一种新型的建筑形式,以其高效、环保、可拆卸等特点受到广泛关注。

新能源网络安全保护技术应用说明书

新能源网络安全保护技术应用说明书

Systematic Application of Commercial Encryption Technology in New Energy Network Security ProtectionBo Wu1, a, Qi Zong2, b, Lei Chen 3, c*, Junping Zhou 4, d, Wuyi Zhang5, e1Westone Information Industry INC., Chengdu City, Sichuan Province, China2Westone Information Industry INC., Chengdu City, Sichuan Province, China3Westone Information Industry INC., Chengdu City, Sichuan Province, China4Westone Information Industry INC., Chengdu City, Sichuan Province, China5Guodian Nanjing Automation Co., Ltd, Nanjing City, Jiangsu Province, Chinaa e-mail:*****************b e-mail:******************Corresponding author: c135****************d e-mail:*****************e e-mail:***************Abstract. China strives to achieve carbon peak by 2030 and carbon neutralityby 2060. The "double carbon" strategy advocates a green, environment-friendlyand low-carbon lifestyle. In order to accelerate the pace of reducing carbonemissions, guide green technology innovation, and improve the global competi-tiveness of industry and economy, China continues to promote the adjustmentof industrial structure and energy structure, vigorously develop renewable ener-gy, accelerate the planning and continuous construction of new energy powergeneration bases such as wind power and photovoltaic, and strive to give con-sideration to economic development and green transformation simultaneously.At the same time, since 2017, the number of global cyber attacks against theenergy sector has surged. Among them, the power grid and oil and gas infra-structure have become the "key areas" of cyber attacks, accounting for morethan 50% of all cyber attacks. In this context, in order to ensure the safe andstable operation of new energy business production, based on the actual re-quirements of network security protection of typical business information sys-tems and automatic control systems under the new energy scenario of electricpower enterprises, this paper studies and proposes systematic encryption appli-cations from encryption service to key management to encryption monitoring.Based on the unified key management and encryption monitoring platform, thetechnical architecture is jointly developed, combined with business processes;realize the design of encryption related applications and software and hardwaremonitoring. At the same time, according to the feasibility of technology realiza-tion and the characteristics of the new energy physical environment, we putforward suggestions on technology implementation, and finally form a practicalapplication prototype suitable for the pilot construction, so as to realize the sys-tematic application of commercial encryption s in the new energy network secu-rity protection, effectively improve the enterprise's network security capabilities© The Author(s) 2023V. Escudero et al. (Eds.): BADS 2022, AHCS 11, pp. 383–390, 2023.https:///10.2991/978-94-6463-102-9_41384 B. Wu et al.and achieve the goal of standardized and safe use of encryption s, so as to en-sure the safe and stable operation of new energy business.Keywords: Electric power enterprises; Systematic application; Network securi-ty protection; Cryptography; Network security1IntroductionIn 2021, the country defined the positioning of carbon peaking and carbon neutraliza-tion, and made a systematic plan and overall deployment for the major work of carbon peaking and carbon neutralization. Guided by relevant policies, China's new energy development, represented by wind power and photovoltaic power generation, and has achieved remarkable results, with the installed capacity ranking first in the world and the proportion of power generation rising steadily. The new energy business is mainly composed of information systems and industrial control systems. As the advanced technology and development space of information systems and industrial control sys-tems continue to increase, network security vulnerabilities will also increase. With frequent network security incidents, new energy network security will face more se-vere challenges [1-2].To sum up, in order to achieve the goal of reaching the total installed capacity of wind power and solar power to more than 1.2 billion kilowatts by 2030, and acceler-ate the construction of a clean, low-carbon, safe and efficient energy system, a strong network security protection framework is required as a business security guarantee. The safe, compliant use and construction of cryptographic technology can help to do a good job in the network security protection of new energy construction in carbon peak and carbon neutral work. To achieve this goal. This paper proposes the systematic application of commercial encryption s in new energy network security protection, and can be applied in new energy wind power generation [3-4].2Problems and needsThe operation and maintenance management of new energy power generation system is an important guarantee for the safe and smooth operation of new energy power generation. This paper takes the typical business system of new energy power genera-tion - centralized control system as an example to study the business process, analyze the problems faced and business network security requirements. With the develop-ment of science and technology in recent years, the intelligent power management system has emerged as the times require, opening a new business model of “unattend-ed and few people on duty” for power generation business. The centralized control system of new energy power generation provides the centralized management and control function of new energy business. Relying on the centralized control center of new energy, power generation enterprises can remotely monitor all new energy sta-tions in the centralized control center, and realize the remote observation, adjustmentSystematic Application of Commercial Encryption 385 It can be controlled to reduce the human resource cost of power generation enterpris-es, integrate all operation data of enterprises, help managers intuitively understand the operation status and existing problems of all stations and equipment, and provide scientific basis for enterprise decision-making. In view of its business model and business process characteristics, relevant analysis was carried out and the following problems were found:•Unattended and few people on duty business model has strict management re-quirements, and management loopholes and weak physical security may lead to unauthorized operation or destruction of illegal personnel;•The new energy business process flows from the new energy centralized control center to the new energy station, and finally to the new energy power generation site. It involves three physical regions vertically and different regions in the typical power network partition horizontally. It is complex and interlaced. If there is no systematic security protection construction, there may be security protection omis-sions in the multi-level business development, Production problems and network security problems that cause internal operation errors and external attacks, mainly in the security protection of business data.In view of the above problems, it can be seen that the centralized control business of the new energy power generation system has the following security requirements: •In the face of massive, wide area, automated and unattended new energy scenarios, it is necessary to solve the problem of personnel identification in physical security based on the application of encryption technology, ensure that the identity of per-sonnel entering the computer room and other important areas is legal, and ensure that the identity of the users of important host equipment deployed by the business system is legal;•In the face of the network situation involving multi zones, multi domains and mul-tiple physical locations involved in the new energy business data flow, it is neces-sary to use cryptographic technology to design business protection based on the at-tributes of business data, and protect the confidentiality, integrity and non repudia-tion of business instructions;•At the same time, according to the basic requirements of the encryption application of the information system, in addition to the technical requirements, the relevant compliance design requirements for the encryption application's own management system, personnel management, construction and operation, and emergency re-sponse should be carried out.3Cryptographic system application designIn the business of the new energy centralized control system, the control command is issued by the centralized control center (centralized control side) to the power plant station (station side), and then issued by the power plant station (station side) to the on-site fan or photovoltaic (site side); Similarly, the collected data is sent from the386 B. Wu et al.field side to the station side and finally to the centralized control side. The business and its associated systems are deployed in different business partitions according tobusiness attributes.network zone 2Fig. 1. Schematic Diagram of New Energy Business.According to the technical requirements of GBT39786-2021 Information Security Technology - Basic Requirements for Cryptographic Application of Information Sys-tems[5], the design of cryptographic application technology is carried out from the following aspects [6]:1) Physical and environmental security. The physical and environmental security of the centralized control side and the station side is designed with the business sys-tem room as the dimension. The systems of each business area are deployed in the same machine room. The encryption application is mainly in the access control sys-tem and video monitoring system of the machine room. For the important areas on the site, the encryption is mainly used in the access control system at the entrance of the fan tower and the control area of the photovoltaic power generation unit, as well as in the video monitoring system of important areas.The access control system is uniformly managed by the centralized control side, and the access control terminals at the centralized control side, the machine room at the station side, and the important areas at the site side can adopt the same encryption application protection design. There are many encryption applications for the access control system. The key dispersion technology based on SM4 algorithm can be used to achieve one card and one encryption for the non-contact access control card, and the symmetric algorithm is used to encrypt the random number. Through the compari-son of the operation results, the identity of the cardholder can be authenticated; At the same time, fingerprint, face and other biometrics and electronic encryption s are used to complete the information input between the entry personnel and the access control recognition terminal. The technology based on SM2, 3 and 4 algorithms is used be-tween the access control recognition terminal and the access control terminal for iden-tity authentication and identification information protection.Systematic Application of Commercial Encryption 387 The access control record information of the machine room at the centralized con-trol side, the station side and the important area at the site side is managed and stored uniformly at the centralized control side; The video monitoring audio and video re-cording data of the computer room at the station side and the important area at the site side are viewed and stored in real time at the station side under their jurisdiction, and then transmitted from the station side to the centralized control side under their juris-diction for storage. The camera terminals in each region use the signature verification technology of SM2 algorithm to conduct two-way authentication and protect the au-thenticity and integrity of video data with the control terminal. The symmetric encryp-tion technology of SM4 algorithm is used to protect the confidentiality of video data. For the unified storage of electronic access control data and video surveillance au-dio and video recording data on the centralized control side, the H-MAC technology based on SM3 algorithm is used for integrity protection. When log data is used, integ-rity verification is performed to ensure that the data has not been tampered with.2) Network and communication security. According to the network topology, the service data transmission network between the centralized control side and the station side, and between the station side and the site side, based on the SM2 algorithm, the communication entities of both sides of the communication are mutually identified to ensure the authenticity of the communication entity identity; SM3 algorithm is used to protect data integrity during communication; SM4 algorithm is used to protect the confidentiality of data in the communication process.3) Equipment and computing security. For important hosts of centralized control business, including servers and workstations, SM2 algorithm is used to authenticate the identity of the person who logs in to the host operating system to ensure the au-thenticity of the identity of the user who logs in to the host. For the key system files of the centralized control system program, the integrity protection is carried out based on SM3 algorithm. Before each startup, the key system files are verified. If the verifica-tion is passed, the program is started normally, and no error is reported through the program.When remotely managing the equipment on the centralized control side, a secure channel is established based on SM2, 3, and 4 algorithms and SSL security protocol technology to establish a secure channel for the transmission of remote management instructions and data.4) Application and data security. For business applications, SM2 based signature verification technology is used to verify the identity of users of business applications to ensure the authenticity of the identity of users using the application system; For the important instruction data transmitted, the signature verification technology based on SM2 protects the data non repudiation, the HASH technology based on SM3 protects the data integrity, and the encryption and decryption technology based on SM4 pro-tects the data confidentiality. For other important data transmitted, the HASH tech-nology based on SM3 protects the integrity of the data, and the encryption and de-cryption technology based on SM4 protects the confidentiality of the data. For the important data stored [7], the integrity of the data is protected by the HASH technology based on SM3, and the confidentiality of the data is protected by the encryption and decryption technology based on SM4.388 B. Wu et al.In addition to encryption application technology, it is designed from the perspec-tive of management to form a systematic application of encryption s, including en-cryption monitoring and key management. Encryption monitoring refers to the moni-toring, statistics and analysis of encryption devices, encryption applications and key management related to encryption applications. Key management mainly refers to the management of key life cycle, mainly in key generation, distribution, storage, use, update, archiving, cancellation, backup, recovery and destruction [8]. The management design is as follows:1) Encryption monitoring. It mainly monitors the status and information related to the encryption application, including the status of the encryption device, such as the memory usage rate and CPU usage rate of the encryption device, and the network traffic, port and IP status of the device; Key information, such as the number of keys and the key used; Business call information, including the number of encryption de-vice connections, business transactions, and the status of business encryption applica-tions.2) Key Management. Through the construction of cryptographic infrastructure, complete the life-cycle management of keys and digital certificates related to crypto-graphic applications. Multi level management and key certificate application can be carried out according to the actual needs of the business.4Suggestions on implementation of encryptionapplicationAccording to the actual scenario of new energy power generation, the following sug-gestions are made for the implementation of encryption application:•After the business security is protected by encryption, it should meet the delay requirements of the business, and at the same time, it should not change the busi-ness operation habits in a large area. In actual operation, the operator should try to use the encryption without feeling;•Meet the site environmental conditions, and consider the equipment form and func-tion realized on the ground. If the physical space of the site environment is tight, the form of encryption application products/systems and the integration of multiple security functions need to be considered for implementation;•The implementation of encryption applications for application and data security needs to consider other security requirements of each business partition, and choose different methods for different types of clients, scenarios and network con-ditions. For example, when the client accesses the business system, if the B/S mode is used, the national security browser is used to establish an SSL channel with the server, during which the client's identity authentication is achieved; If the C/S mode is adopted, the client uses the smart encryption key, encryption card and oth-er encryption modules, and the server calls the encryption device/system to achieve SM2 based identity authentication. The encryption service for the business server can also be implemented by selecting a encryption device or a encryption serviceSystematic Application of Commercial Encryption 389 platform based on the cloud micro service architecture according to the scenario, network, business system quantity, architecture and other factors;•In order to avoid repeated construction and waste, it is necessary to formulate the relevant encryption application specification system according to the actual im-plementation situation to achieve unified planning, unified construction and unified management of encryption applications.5ConclusionsThe cryptographic technology mentioned in this paper provides important support for identification, secure channel, information encryption, integrity protection and non repudiation of the new energy business system. As the underlying technology of net-work security, the use of encryption technology is the foundation, legal and compliant use and regulatory encryptions are the baseline, and encryption construction com-bined with business characteristics is the implementation principle of encryption ap-plications. Systematical application of encryption technology can not only ensure business production security, avoid new security risks caused by security equipment vulnerabilities, but also monitor whether the protection means are correct and effec-tive in real time, the key is managed throughout its life cycle. The systematic applica-tion of encryptions is applicable to a variety of new energy power generation scenari-os, providing strong and reliable network protection for the development of new ener-gy business.AcknowledgmentThis paper was supported by Westone Information Industry INC., and Guodian Nan-jing Automation Co., Ltd.References1.LIU B, LI L, LIU J, et al, (2021)Analysis of Weak Links in Network Security of PowerMonitoring System in New Energy Fields. Electric Engineering, 18. 78-80.2.GAO P, CHEN ZY, YAN LC, et al, (2021) A New Generation of Power Data SecurityProtection Technology for Zero-trust Environment, Electric Power Information and Com-munication Technology, 19: 7-14.3.GE W, (2020) Applied analysis of Electricity Information Acquisition System in Electrici-ty Marketing, Computer Products and Circulation, 4:104.4.JIA JF, YI HM, XIA XY, et al, (2017) Distributed energy power system access new meter-ing system, Power System Protection and Control, 45:118-124.5.GB/T39786, (2021) Information security technology-Baseline for information systemcryptography application.6.ZHAO YQ, (2019) Application of secondary safety protection system in photovoltaicpower station, Information Technology and Informatization, 10.7. WANG J, SONG Y, HAN S, (2018) Encryption of CARS data-link communication based on SM4 algorithm, Journal of Civi Aviation Universrry of China, 36(1): 6-10.8. LIU X, (2021) Research on cryptography application in computer network security, China Broadband, 3: 25.Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0International License (),which permits any noncommercial use,sharing,adaptation,distribution and reproduction in any medium or format,as long as you give appropriate credit to the original author(s)and the source,provide a link to the Creative Commons license and indicate if changes were made.The images or other third party material in this chapter are included in the chapter’s Creative Commons license,unless indicated otherwise in a credit line to the material.If material is not included in the chapter’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use,you will need to obtain permission directly from the copyright holder./licenses/by-nc/4.0/390 B. Wu et al.。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
1. Bad metrics hurt 2. Secure-by default frameworks 3. Nobody uses WAFs 4. QA can’t do software security 5. Advocacy over audit 6. AA is hard 7. Practitioners don’t talk attacks 8. Training is advanced 9. Pen testing is diminishing 10.Fuzz testing
SDLC Alchemy
CLASP
More Questions than Answers
Same activities for all soft are project? acti ities software How to get budget / internal support? Which l Whi h vulnerabilities d I h biliti do have t fi ? to fix? What about outsourcing? How to handle open source? Who does the work?
Example activity
[T1.3] Establish SSG office hours. The SSG offers help to any and all comers during an advertised lab period or regularly scheduled office h l l h d l d ffi hours. B acting as an By ti informal resource for people who want to solve security problems, the SSG leverages teachable moments and emphasizes th carrot over th stick. Offi h h i the t the ti k Office hours might i ht be held one afternoon per week in the office of a senior SSG member.
Change focus
Old: Integrate into development lifecycle New: Create a software security initiative
6
Breaking new ground
Building Security In Maturity Model (BSIMM) p First empirical data from real initiatives Joint work: Brian Chess, G Ch Gary McGraw, Sammy Migues
Data collection
(Anthropologists unite!)
Big idea: stop hypothesizing, study successful organizations g Create a software security framework In-person executive interviews In person Build bullet lists (one per practice) Bucketize the lists to identify activities Create levels – Objectives Activities – 110 activities supported by real data – Three levels of “maturity”
12
The Software Security Framework (SSF)
Governance Strategy and Metrics Compliance and Policy Intelligence Attack Models Security S it Features and Design Standards and Requirements SSDL Touchpoints Architecture Analysis Code Review Deployment Penetration Testing Software Environment
Technology is cool
Find vulnerabilities* Protect against attack* Harness dev horsepower* Manage vulnerabilities*
* Use only as directed. One part of a healthy security regimen.
Use BSIMM results
BSIMM released March 5 – http://bsi mm com BSIMM i a yardstick is d ti k – Use it to see where you stand – Use it to figure out what should you do next
The nine
( (and two unnamed financial services companies) p )

Real-world data
Age: 5.3 y g yrs
– Newest: 2.5 – Oldest: 10
Satellite size: 79
– Smallest: 0 – Largest: 300 – Median: 20
/articles/article.aspx?p=1315431 http // informit com/articles/article asp ?p 1315431
BSIMM basics
Software security framework Top-down presentation through GOALS and OBJECTIVES 110 activities with examples Three levels of maturity Discussion of how to use the model
p
We hold these truths to be self-evident
Software security is more than security functions Not magic crypto fairy dust Not silver-bullet security mechanisms Non-functional aspects of systems are essential p y Must address both bugs in code and flaws in design Security is an emergent property To end up with secure software, you have to build security in
SSG size: 41
– Smallest: 12 – Largest: 100 – Median: 35
Dev size: 7750
– Smallest: 450 – Largest: 30,000 – Median: 5000
Average SSG size: 1% of dev
Ten surprising things
Configuration Management and Vulnerability Management
Training
Security Testing
/articles/article.aspx?p=1271382
Example: skeleton for training practice
Scorecard (overview)
Common ground
Everyone has a software security group (SSG) SSG is roughly 1% size of dev team Ten activities that ALL do
evangelist role policy awareness training history in training y g security features static analysis SSG does AA black box tools external pen testing p g good network security
/articles/article.aspx?p=1326511
Scorecard (detail)
10 things all do – green = good – red = bad Blue shift practices to emphasize – activities you should think about in blue
The Building Security In Maturity Model M d l (BSIMM)
Brian Chess, Gary McGraw Fortify Software, Cigital Inc 04/24/09 | AND-401 Session Classification: Intermediate
The Building Security In Maturity Model M d l (BSIMM)
Brian Chess, Gary McGraw Fortify Software, Cigital Inc 04/24/09 | AND-401
p
相关文档
最新文档